GLARE 发表于 2025-3-26 23:39:59

Machine-Checked Proofs for Realizability Checking Algorithms,rithmetic and uninterpreted functions. In that work, we used an SMT solver and an algorithm similar to k-induction to establish the realizability of a contract, and justified our approach via a hand proof. Given the central importance of realizability to our virtual integration approach, we wanted a

Corporeal 发表于 2025-3-27 02:11:42

coverage inthis text. Particularly novel features of the book include asystematic treatment of the modelling process in a marine context, theinclusion of diffu978-1-4419-5013-0978-1-4757-4786-7Series ISSN 1387-6961

儿童 发表于 2025-3-27 08:24:17

http://reply.papertrans.cn/99/9818/981754/981754_33.png

amyloid 发表于 2025-3-27 10:34:51

Testing the IPC Protocol for a Real-Time Operating System,n system-calls. Inheriting a micro-architecture going back to the L4 kernel, the system calls of the IPC-API are internally structured by atomic actions; according to a security model, these actions can fail and must produce error-codes. Thus, our tests reveal errors in the enforcement of the security model.

regale 发表于 2025-3-27 16:31:24

http://reply.papertrans.cn/99/9818/981754/981754_35.png

Banquet 发表于 2025-3-27 20:53:46

http://reply.papertrans.cn/99/9818/981754/981754_36.png

极深 发表于 2025-3-27 22:03:20

http://reply.papertrans.cn/99/9818/981754/981754_37.png

椭圆 发表于 2025-3-28 02:25:40

Recursive Games for Compositional Program Synthesis,this paper, we present a way to exploit compositionality in the context of ...The goal in our synthesis problem is to instantiate missing expressions in a procedural program so that the resulting program satisfies a safety or termination requirement in spite of an adversarial environment. The proble

Heretical 发表于 2025-3-28 10:16:52

Testing the IPC Protocol for a Real-Time Operating System,ce our data-models are complex, the problem is out of reach of conventional model-checking techniques. Our solution is based on symbolic execution implemented inside the interactive theorem proving environment Isabelle/HOL extended by a plugin with test generation facilities called HOL-TestGen..As a

追逐 发表于 2025-3-28 10:54:14

Pseudo-Random Number Generator Verification: A Case Study,ng error affecting the information flow in the seeding code of the generator has weakened the security of the cryptographic protocol behind bitcoin transactions..We demonstrate that logic-based verification can be efficiently applied to safeguard against this particular class of vulnerabilities, whi
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Verified Software: Theories, Tools, and Experiments; 7th International Co Arie Gurfinkel,Sanjit A. Seshia Conference proceedings 2016 Sprin